Jump to content

O.D.D

Members
  • Posts

    2
  • Joined

  • Last visited

Posts posted by O.D.D

  1. Hi guys, I've been looking around the Internet and maybe I'm using the wrong search terms

    but it strikes me that an attacker once a Man in the middle can interfere with an data.

    When the victim starts a download of an executable, a .PDF or a .DOC the attacker could

    switch the file with a Trojan, compromising the victim.

    On the easy side you could switch any .exe with a prepared file that just gives you a

    "not a valid windows 32 application" and exits after installing the payload.

    On the more difficult side we could theoretical add payload on the fly. I've been looking

    for something cool to develop and if there's nothing out there I might start working on this.

    But if it already exists I don't want to waste my time.

    So it this can be done it would be a cool topic for an episode, if not it would be a cool

    topic for me. What do you guys think?

  2. Hi Guy's and Girls.

    I have a lot of data going through my Macbook and I'd like to try messing around with a lot of the tools I've seen like driftnet.

    I have a VM (VMWare fusion) running Blackbuntu which I love and use a lot. My question is how can I get the packets coming

    from my mac's wireless adapter to my mac's NIC to pass though the hosted VM.

    Idealy I'd love to give blackbuntu access to the network adapters and let it worry about any forwarding but I'd settle for

    bouncing some of the data it's way.

    Thanks a lot.

    ODD

×
×
  • Create New...